As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
The end of the password as we know it…
…pssst. I have a secret. What’s the password? Passwords have been around forever. In the Bible the password was “shibboleth”, the Romans had “watchwords”, “tessera” is Latin for password and who could forget “Open Sesame”. In our connected, digital world we all depend on them and have depended on them …
Tricky Android Malware
It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”